Description
The OpenID Connect (OIDC) authentication configuration in PowerShell
Universal before 2026.1.3 stores the OIDC client secret in cleartext in
the .universal/authentication.ps1 script, which allows an attacker with read access to that file to obtain the OIDC client credentials
Published: 2026-02-27
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unencrypted OIDC client credentials exposure
Action: Apply update
AI Analysis

Impact

The vulnerability causes the OpenID Connect client secret to be stored in plain text within the authentication.ps1 script for PowerShell Universal versions before 2026.1.3. An attacker who can read that script file can retrieve the client secret, enabling credential compromise and potential unauthorized access to protected resources.

Affected Systems

Devolutions PowerShell Universal software is affected on all releases prior to version 2026.1.3. No specific sub‑versions are listed beyond this cutoff.

Risk and Exploitability

The Common Vulnerability Scoring System evaluates the severity at 5.5, indicating moderate risk. The exploit probability as measured by EPSS is below 1%, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is therefore local or privilege‑relay: an actor must gain read access to the authentication.ps1 file, which may be achieved through misconfigured file permissions or compromised user accounts. The impact exists only for confidentiality of credentials; there is no direct denial of service or code execution identified.

Generated by OpenCVE AI on April 16, 2026 at 15:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PowerShell Universal to version 2026.1.3 or later to eliminate the cleartext credential storage.
  • If an immediate upgrade is not possible, restrict file system permissions on the .universal/authentication.ps1 script so that only trusted service accounts and administrators can read it.
  • Rotate and regenerate the OIDC client secret to invalidate any credentials that may have been exposed while interim mitigations are in place.

Generated by OpenCVE AI on April 16, 2026 at 15:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Cleartext Storage of OIDC Client Secret in PowerShell Universal

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Ironmansoftware
Ironmansoftware powershell Universal
CPEs cpe:2.3:a:ironmansoftware:powershell_universal:*:*:*:*:*:*:*:*
Vendors & Products Ironmansoftware
Ironmansoftware powershell Universal
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Devolutions
Devolutions powershell Universal
Vendors & Products Devolutions
Devolutions powershell Universal

Fri, 27 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description The OpenID Connect (OIDC) authentication configuration in PowerShell Universal before 2026.1.3 stores the OIDC client secret in cleartext in the .universal/authentication.ps1 script, which allows an attacker with read access to that file to obtain the OIDC client credentials
Weaknesses CWE-312
References

Subscriptions

Devolutions Powershell Universal
Ironmansoftware Powershell Universal
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-03-30T20:43:33.695Z

Reserved: 2026-02-26T15:29:18.531Z

Link: CVE-2026-3277

cve-icon Vulnrichment

Updated: 2026-03-06T15:05:28.131Z

cve-icon NVD

Status : Modified

Published: 2026-02-27T16:16:26.260

Modified: 2026-03-30T21:17:10.657

Link: CVE-2026-3277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:30:06Z

Weaknesses